Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-32597: Cross-Site Request Forgery (CSRF) in George Sexton WordPress Events Calendar Plugin – connectDaily

0
Unknown
VulnerabilityCVE-2025-32597cvecve-2025-32597
Published: Wed Apr 09 2025 (04/09/2025, 16:09:30 UTC)
Source: CVE Database V5
Vendor/Project: George Sexton
Product: WordPress Events Calendar Plugin – connectDaily

Description

Cross-Site Request Forgery (CSRF) vulnerability in George Sexton WordPress Events Calendar Plugin – connectDaily connect-daily-web-calendar allows Cross-Site Scripting (XSS).This issue affects WordPress Events Calendar Plugin – connectDaily: from n/a through <= 1.5.4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 03:32:51 UTC

Technical Analysis

CVE-2025-32597 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the George Sexton WordPress Events Calendar Plugin – connectDaily, specifically affecting versions up to and including 1.5.4. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unwanted actions on a web application in which they are currently authenticated. In this case, the plugin does not adequately verify the origin of requests, enabling attackers to craft malicious requests that execute actions such as modifying event data or plugin settings without user consent. Furthermore, the plugin is also vulnerable to Cross-Site Scripting (XSS), which can be exploited to inject malicious scripts into the plugin’s interface or stored data. This combination can be leveraged by attackers to perform complex attacks, including session hijacking, privilege escalation, or persistent defacement. The vulnerability affects WordPress sites using this plugin, which is popular for event management. Although no exploits have been reported in the wild yet, the presence of both CSRF and XSS increases the risk profile. The vulnerability was published on April 9, 2025, and no CVSS score has been assigned yet. The lack of patches at the time of publication indicates that users should be vigilant and implement interim mitigations. The plugin’s failure to implement anti-CSRF tokens or proper request validation is the root cause. This vulnerability compromises the integrity and confidentiality of affected sites by allowing unauthorized actions and script injections.

Potential Impact

The impact of CVE-2025-32597 is significant for organizations using the George Sexton WordPress Events Calendar Plugin. Successful exploitation can lead to unauthorized modification of event data, plugin configurations, or other sensitive information managed by the plugin. The CSRF vulnerability enables attackers to perform actions as authenticated users without their knowledge, potentially leading to data integrity issues and unauthorized changes. The associated XSS vulnerability can be exploited to execute malicious scripts in the context of the victim’s browser, leading to session hijacking, credential theft, or further malware distribution. For organizations relying on the plugin for event management, this can disrupt business operations, damage reputation, and expose user data. Since WordPress powers a large portion of websites globally, and event calendar plugins are common, the scope of affected systems is broad. The absence of known exploits currently provides a window for proactive defense, but the ease of exploitation and combination with XSS increases the risk of future attacks. Organizations with public-facing WordPress sites using this plugin are particularly vulnerable to targeted attacks aiming to manipulate event information or inject malicious content.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify the use of the George Sexton WordPress Events Calendar Plugin – connectDaily, especially versions up to 1.5.4. Until an official patch is released, administrators should consider disabling or uninstalling the plugin to eliminate exposure. If disabling is not feasible, restrict access to the plugin’s administrative interfaces to trusted IP addresses and enforce strict user roles and permissions to minimize the risk of CSRF exploitation. Implement Web Application Firewall (WAF) rules to detect and block suspicious CSRF and XSS payloads targeting the plugin endpoints. Encourage users to log out of WordPress admin sessions when not in use to reduce the window of opportunity for CSRF attacks. Monitor logs for unusual POST requests or changes in event data that could indicate exploitation attempts. Once a patch becomes available, apply it promptly and verify that anti-CSRF tokens and input sanitization are properly implemented. Additionally, educate site administrators and users about the risks of CSRF and XSS vulnerabilities and the importance of cautious behavior when interacting with links or emails that could trigger malicious requests.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-09T11:20:27.475Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd73e1e6bfc5ba1def3f07

Added to database: 4/1/2026, 7:37:05 PM

Last enriched: 4/2/2026, 3:32:51 AM

Last updated: 4/6/2026, 11:06:22 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses